2020 New Java Interview Questions-Spring (2)

#1. Are beans in spring thread-safe?
(Related recommendations: java interview questions)
Whether the beans in the Spring container are thread-safe, the container itself does not provide a thread-safety policy for the beans, so It can be said that the beans in the spring container themselves do not have thread safety characteristics, but the details still need to be studied in combination with the beans in the specific scope.
2. How many bean scopes does spring support?
When you create a Bean instance through the spring container, you can not only complete the instantiation of the Bean instance, but also specify a specific scope for the Bean. Spring supports the following five scopes:
singleton: singleton mode. In the entire Spring IoC container, beans defined using singleton will have only one instance.
prototype: prototype mode, each time it is passed When the getBean method of the container obtains the Bean defined by prototype, a new Bean instance will be generated
request: For each HTTP request, the Bean defined using request will generate a new instance, that is, each HTTP request Different Bean instances will be generated. This scope is only valid when using Spring in a web application
session: For each HTTP Session, a new instance is generated using the Bean beans defined by the session. This scope is also only valid when using Spring in a web application
globalsession: For each global HTTP Session, the beans defined using the session will generate a new instance. Typically, this is only valid when using a portlet context. This scope is also only valid when using Spring in a web application
The more commonly used scopes are singleton and prototype. For singleton scoped beans, you will get the same instance every time you request the bean. The container is responsible for tracking the status of the Bean instance and maintaining the life cycle behavior of the Bean instance;
If a Bean is set to prototype scope, Spring will create a new Bean instance every time the program requests the Bean with this ID, and then Return to program. In this case, the Spring container only uses the new keyword to create the Bean instance. Once created successfully, the container no longer tracks the instance and does not maintain the state of the Bean instance.
If you do not specify the scope of the bean, Spring uses the singleton scope by default.
When Java creates a Java instance, it needs to apply for memory; when it destroys the instance, it needs to complete garbage collection. These tasks will lead to an increase in system overhead. Therefore, the creation and destruction of prototype scope beans is relatively expensive. Once the Bean instance in the singleton scope is successfully created, it can be reused.
Therefore, unless necessary, try to avoid setting the Bean to the prototype scope.
3. What are the ways for spring to automatically assemble beans?
The Spring container is responsible for creating beans in the application and coordinating the relationship between these objects through IDs. As developers, we need to tell Spring which beans to create and how to wire them together.
There are two ways to assemble beans in spring:
1. Implicit bean discovery mechanism and automatic assembly
2. Explicit configuration in java code or XML
Of course these methods can also be used in conjunction.
4. What are the implementation methods of spring transactions?
Programmatic transaction management is the only option for POJO-based applications. We need to call beginTransaction(), commit(), rollback() and other transaction management-related methods in the code. This is programmatic transaction management.
Declarative transaction management based on TransactionProxyFactoryBean
Declarative transaction management based on @Transactional
Configuring transactions based on Aspectj AOP
5. Talk What about spring's transaction isolation?
Transaction isolation level refers to the degree of isolation between the modification of data by one transaction and another parallel transaction. When multiple transactions access the same data at the same time, if the necessary isolation mechanism is not adopted, it will The following problems may occur:
Dirty read: One transaction reads uncommitted update data from another transaction.
Phantom read: For example, the first transaction modifies the data in a table. For example, this modification involves "all data rows" in the table. At the same time, the second transaction also modifies the data in this table. This modification is to insert "a row of new data" into the table.
Then, in the future, the user who operates the first transaction will find that there are still unmodified data rows in the table, as if an illusion has occurred.
Non-repeatable reading: For example, two identical select statements are executed successively in the same transaction. During this period, no DDL statements were executed in this transaction, but the results obtained successively are inconsistent. This is non-repeatable. read.
The above is the detailed content of 2020 New Java Interview Questions-Spring (2). For more information, please follow other related articles on the PHP Chinese website!
Hot AI Tools
Undress AI Tool
Undress images for free
Undresser.AI Undress
AI-powered app for creating realistic nude photos
AI Clothes Remover
Online AI tool for removing clothes from photos.
Clothoff.io
AI clothes remover
Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!
Hot Article
Hot Tools
Notepad++7.3.1
Easy-to-use and free code editor
SublimeText3 Chinese version
Chinese version, very easy to use
Zend Studio 13.0.1
Powerful PHP integrated development environment
Dreamweaver CS6
Visual web development tools
SublimeText3 Mac version
God-level code editing software (SublimeText3)
What is a deadlock in Java and how can you prevent it?
Aug 23, 2025 pm 12:55 PM
AdeadlockinJavaoccurswhentwoormorethreadsareblockedforever,eachwaitingforaresourceheldbytheother,typicallyduetocircularwaitcausedbyinconsistentlockordering;thiscanbepreventedbybreakingoneofthefournecessaryconditions—mutualexclusion,holdandwait,nopree
How to use Optional in Java?
Aug 22, 2025 am 10:27 AM
UseOptional.empty(),Optional.of(),andOptional.ofNullable()tocreateOptionalinstancesdependingonwhetherthevalueisabsent,non-null,orpossiblynull.2.CheckforvaluessafelyusingisPresent()orpreferablyifPresent()toavoiddirectnullchecks.3.Providedefaultswithor
Java Persistence with Spring Data JPA and Hibernate
Aug 22, 2025 am 07:52 AM
The core of SpringDataJPA and Hibernate working together is: 1. JPA is the specification and Hibernate is the implementation, SpringDataJPA encapsulation simplifies DAO development; 2. Entity classes map database structures through @Entity, @Id, @Column, etc.; 3. Repository interface inherits JpaRepository to automatically implement CRUD and named query methods; 4. Complex queries use @Query annotation to support JPQL or native SQL; 5. In SpringBoot, integration is completed by adding starter dependencies and configuring data sources and JPA attributes; 6. Transactions are made by @Transactiona
Java Cryptography Architecture (JCA) for Secure Coding
Aug 23, 2025 pm 01:20 PM
Understand JCA core components such as MessageDigest, Cipher, KeyGenerator, SecureRandom, Signature, KeyStore, etc., which implement algorithms through the provider mechanism; 2. Use strong algorithms and parameters such as SHA-256/SHA-512, AES (256-bit key, GCM mode), RSA (2048-bit or above) and SecureRandom; 3. Avoid hard-coded keys, use KeyStore to manage keys, and generate keys through securely derived passwords such as PBKDF2; 4. Disable ECB mode, adopt authentication encryption modes such as GCM, use unique random IVs for each encryption, and clear sensitive ones in time
LOL Game Settings Not Saving After Closing [FIXED]
Aug 24, 2025 am 03:17 AM
IfLeagueofLegendssettingsaren’tsaving,trythesesteps:1.Runthegameasadministrator.2.GrantfullfolderpermissionstotheLeagueofLegendsdirectory.3.Editandensuregame.cfgisn’tread-only.4.Disablecloudsyncforthegamefolder.5.RepairthegameviatheRiotClient.
How to use the Pattern and Matcher classes in Java?
Aug 22, 2025 am 09:57 AM
The Pattern class is used to compile regular expressions, and the Matcher class is used to perform matching operations on strings. The combination of the two can realize text search, matching and replacement; first create a pattern object through Pattern.compile(), and then call its matcher() method to generate a Matcher instance. Then use matches() to judge the full string matching, find() to find subsequences, replaceAll() or replaceFirst() for replacement. If the regular contains a capture group, the nth group content can be obtained through group(n). In actual applications, you should avoid repeated compilation patterns, pay attention to special character escapes, and use the matching pattern flag as needed, and ultimately achieve efficient
Edit bookmarks in chrome
Aug 27, 2025 am 12:03 AM
Chrome bookmark editing is simple and practical. Users can enter the bookmark manager through the shortcut keys Ctrl Shift O (Windows) or Cmd Shift O (Mac), or enter through the browser menu; 1. When editing a single bookmark, right-click to select "Edit", modify the title or URL and click "Finish" to save; 2. When organizing bookmarks in batches, you can hold Ctrl (or Cmd) to multiple-choice bookmarks in the bookmark manager, right-click to select "Move to" or "Copy to" the target folder; 3. When exporting and importing bookmarks, click the "Solve" button to select "Export Bookmark" to save as HTML file, and then restore it through the "Import Bookmark" function if necessary.
'Java is not recognized' Error in CMD [3 Simple Steps]
Aug 23, 2025 am 01:50 AM
IfJavaisnotrecognizedinCMD,ensureJavaisinstalled,settheJAVA_HOMEvariabletotheJDKpath,andaddtheJDK'sbinfoldertothesystemPATH.RestartCMDandrunjava-versiontoconfirm.


